INFORMATION SECURITY
SAFECATCH
Physical Security
Social Engineering
HODGE PODGE
100
unsolicited e-mail. From the senders point of view they are often sending bulk emails sent from a list obtained from trade shows and companies known to share e-mail lists.
What is SPAM?
100
A customer approaches your teller line and give you the "Gift of Fear"; What do you say and do?
I'm sorry, my computer just crashed, I am going to see my supervisor and I will be right back. As you are saying this you are walking completely out of the teller line.
100
Your branch has just been robbed, where is the quickest place to find the robbery packet?
Go to InKlein, Departments, Fraud, Upper Left side click on Robbery Kit.
100
refers to the protection of assets in order to achieve Confidentiality, Integrity, Availability
What is Information Security?
100
When Tom Erickson is on vacation which LOPS employee thinks she is the Chief Credit Officer?
Rose Peterson
200
.. a form of fraud where personal information such as login credentials or account information is being requested by someone pretending to be a trusted entity or person.
What is Phishing?
200
You are implementing SAFECATCH at the teller line when the customer/robber suddenly initiates the robbery. What do you say or do?
Do not walk away from the teller line. Comply completely with the robbers demands so he leaves the bank quickly after the robber thus eliminating any threat or harm.
200
Your partner has entered the bank for opening but hasn't put out the all clear signal. What do you do?
Call into the bank, give your name and ask for the balance on your checking account. If your partner says to call back because the computers are down this is a duress signal and you should leave and call 911.
200
.. is exactly what the name implies. It updates Microsoft windows. It doesn't update third party software such as QuickBooks, Norton Anti-Virus, Java, etc..
What is Windows Update?
200
What are the steps prior to opening the bank?
Drive around the outside, check the inside and put up all clear sign. If anything is wrong you would leave immediately to your branch safe location and call 911.
300
.. unauthorized access to a business account - often through the theft of online credentials or by hijacking an online session - then initiating transactions, changing contact information, and gathering information on the account's history to commit other crimes.
What is Corporate Account Takeover?
300
What do you say and do when you see a person, who gives you the gift of fear, just entering your branch.
Introduce yourself, make solid eye contact and say: What brings you to the branch today? Please follow me to my office and I will take care of that transaction for you. I will need your driver's license.
300
What is the number one deterrent to a bank robber?
Great customer service. Keep the robber in the role of a customer and away from the teller line.
300
.. a number of Internet computers that, although their owners are unaware of it, have been set up to forward transmissions (including spam or viruses) to other computers on the Internet. Any such computer is referred to as a zombie - in effect, a computer "robot" or "bot" that serves the wishes of some master somewhere on the Internet.
What is a Botnets?
300
..allows you to safely and easily create a secured and encrypted user name/password list.
What is Password Safe
400
.. is an attempt to make a machine or network resource unavailable to its intended users. The attack source is distributed from more than one, often thousands of unique addresses on the Internet.
What is Distributed Denial-of-Service (DDoS) attack?
400
You are opening the branch, what are the steps you take in the Bank Opening?
Drive around looking for persons or things that are suspicious, if so, would you leave and call the police. If all okay outside you enter the branch and put up the all clear signal if everything is fine inside your branch.
400
You are coming into work at the Service Center when someone tries to force you into the building. How do you set off the duress alarm?
Switch the last two numbers of your four digit code.
400
..are often used as a trusted form of payment to consumers for goods and services, but if the consumer wires a portion of the funds to a scam artist or otherwise used the funds—only to find out later—that the consumer owes the bank the full amount of the cashier’s check that had been deposited
What is cashier check fraud?
400
.. any software used to disrupt computer operations, gather sensitive information, gain access to private computer systems, or display unwanted advertising.
What is Malware?
500
.. Information that can be used on its own or with other information to identify, contact, or locate an individual. Includes information such as name, social security number, date and place of birth, mother‘s maiden name, biometric records, medical records, educational records, financial records, and employment information.
What is Personal Identifiable Information (PII)?
500
The robber has just robbed you. Explain what you say and do next as the teller and other employee.
(C)all 911, (A)lert other of the robbery by waving an arm and go (T)actical. Another employee confirms with the teller you have been robbed and announces there has been a robbery and all is safe. This person then locks the doors. All employees look outside a window and report to the teller the whereabouts of the robber.
500
Finish the line: If you see something ...
Say Something
500
There is an active shooter in your building, what are the three things you can do so protect or save yourself before the police arrive?
1. Leave the building immediately upon hearing gunshots. 2. Find a place to hide. (Under your desk or better yet bunker yourself with several employees in a bathroom.) 3. As a last resort you may have to attack the shooter.
M
e
n
u